|
|
Subscribe / Log in / New account

Trustix alert TSLSA-2004-0029 (kernel)

From:  Trustix Security Advisor <tsl@trustix.org>
To:  tsl-announce@lists.trustix.org
Subject:  TSLSA-2004-0029 - kernel
Date:  Fri, 14 May 2004 14:09:16 +0200

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Trustix Secure Linux Security Advisory #2004-0029 Package name: kernel Summary: local root Date: 2004-05-13 Affected versions: Trustix Secure Linux 2.0 Trustix Secure Linux 2.1 Trustix Secure Enterprise Linux 2 - -------------------------------------------------------------------------- Package description: The kernel package contains the Linux kernel (vmlinuz), the core of your Trustix Secure Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc. Problem description: There is an integer overflow in the SCTP code in the Linux kernel starting with 2.4.23-pre5 and up to and including 2.4.25. This could allow for a local root exploit. Action: We recommend that all systems with this package installed be upgraded. Location: All Trustix Secure Linux updates are available from <URI:http://http.trustix.org/pub/trustix/updates/> <URI:ftp://ftp.trustix.org/pub/trustix/updates/> About Trustix Secure Linux: Trustix Secure Linux is a small Linux distribution for servers. With focus on security and stability, the system is painlessly kept safe and up to date from day one using swup, the automated software updater. Automatic updates: Users of the SWUP tool can enjoy having updates automatically installed using 'swup --upgrade'. Public testing: Most updates for Trustix Secure Linux are made available for public testing some time before release. If you want to contribute by testing the various packages in the testing tree, please feel free to share your findings on the tsl-discuss mailinglist. The testing tree is located at <URI:http://tsldev.trustix.org/horizon/> You may also use swup for public testing of updates: site { class = 0 location = "http://tsldev.trustix.org/horizon/rdfs/latest.rdf" regexp = ".*" } Questions? Check out our mailing lists: <URI:http://www.trustix.org/support/> Verification: This advisory along with all Trustix packages are signed with the TSL sign key. This key is available from: <URI:http://www.trustix.org/TSL-SIGN-KEY> The advisory itself is available from the errata pages at <URI:http://www.trustix.org/errata/trustix-2.0/> and <URI:http://www.trustix.org/errata/trustix-2.1/> or directly at <URI:http://www.trustix.org/errata/2004/0029/> MD5sums of the packages: - -------------------------------------------------------------------------- eeeaf33d8d9bcbc7a21529a8950476f5 TSEL-2/kernel-2.4.26-1tr.i586.rpm 0e6200765dbec0dcc085137adabaacd0 TSEL-2/kernel-BOOT-2.4.26-1tr.i586.rpm 0edde099e9376684ba17ac179fa06feb TSEL-2/kernel-doc-2.4.26-1tr.i586.rpm 5956c35f807165228ec94559fb30be4b TSEL-2/kernel-firewall-2.4.26-1tr.i586.rpm cecd6f7a2cf5edb24e3ddbfe132bedd9 TSEL-2/kernel-firewallsmp-2.4.26-1tr.i586.rpm 04a04a7821b5caaccd346b406f6f2548 TSEL-2/kernel-smp-2.4.26-1tr.i586.rpm 1ea36a2d9b6bd6aa0d47f88a66dd6f21 TSEL-2/kernel-source-2.4.26-1tr.i586.rpm 40452d3190f71b76beed0226af9a9865 TSEL-2/kernel-utils-2.4.26-1tr.i586.rpm 85fbe89ee3c1bf70eefe6acb89aa677c 2.1/rpms/kernel-2.4.26-1tr.i586.rpm cf9b729feedd6e4010a0e2d0b8fac6ec 2.1/rpms/kernel-BOOT-2.4.26-1tr.i586.rpm b591fc164a582be62cd3035b4166d5f9 2.1/rpms/kernel-doc-2.4.26-1tr.i586.rpm 61bb7c56d05697d5497c33b3e7f3e8c3 2.1/rpms/kernel-firewall-2.4.26-1tr.i586.rpm 6cbf533d849e0ae9a78250888dfec059 2.1/rpms/kernel-firewallsmp-2.4.26-1tr.i586.rpm 6784d9305e1e65c89e1fb88e5249d739 2.1/rpms/kernel-smp-2.4.26-1tr.i586.rpm ad03628c2b7a459a58e9f3026d3a3adb 2.1/rpms/kernel-source-2.4.26-1tr.i586.rpm ea8ad0270f2abebe5fb3e065970f80d8 2.1/rpms/kernel-utils-2.4.26-1tr.i586.rpm ceb811cb9c0abf0a8d3779665f2281f8 2.0/rpms/kernel-2.4.26-1tr.i586.rpm a2b9d9a9243651f85f16cab7b086d444 2.0/rpms/kernel-BOOT-2.4.26-1tr.i586.rpm 768c765a935513d6c51bd24ce9031364 2.0/rpms/kernel-doc-2.4.26-1tr.i586.rpm 126fde71a2727ccb344df4d340e07d4e 2.0/rpms/kernel-firewall-2.4.26-1tr.i586.rpm fc73d5d8ac5488a5983f55d9597b142d 2.0/rpms/kernel-firewallsmp-2.4.26-1tr.i586.rpm 28920e2fa00b42997c077f6bbdf71d5e 2.0/rpms/kernel-smp-2.4.26-1tr.i586.rpm 2ed295b378848e9a63a3e73f9e3bd97e 2.0/rpms/kernel-source-2.4.26-1tr.i586.rpm fe68faea42df2c728f00d40ff23438a7 2.0/rpms/kernel-utils-2.4.26-1tr.i586.rpm - -------------------------------------------------------------------------- Trustix Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.2 (GNU/Linux) iD8DBQFApI9Fi8CEzsK9IksRAqZuAJ9rfiBxbD2cVq7PPWL1SdDEuYRYBQCdF5XO V285YkHJe77bwbBTm+pMSVk= =6fda -----END PGP SIGNATURE----- _______________________________________________ tsl-announce mailing list tsl-announce@lists.trustix.org http://lists.trustix.org/mailman/listinfo/tsl-announce


(Log in to post comments)


Copyright © 2024, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds